A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount. So, the paper will wipe out the symmetric cryptography , and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of privacy-protection and switch between them optionally by users: The first is anonymous scheme which can make nobody know
fatcat:3gborlznmrac3ebiwzxjjy5jly